Diff
Not logged in

Differences From Artifact [233d073974]:

To Artifact [0143b10a32]:


54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
..
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
feet, mail-drones, commuters, who just pick up and
dump files through their cellphone WiFi, etc.
**Silktorrent e-mail or an instant messaging
service can be implemented by saving extra
records to a separate database, where there is a
relation between the tar-file name, recipient ID and 
suggested-deletion-date.** 
Counter-measures for Denial-of-Service attacks is 
based on authentication, timing, location(channel).


One of the core ideas of the Silktorrent is that 
the Silktorrent applications must assume that the 
location of the tar-file can not be concluded from
its name. Silktorrent applications ask for tar-files
from agents, who might not have the asked tar-file 
available and the agents might not even be able to 
retrieve the asked tar-file. The agents are free to
use whatever [crazy](http://longterm.softf1.com/specifications/lightmsgp/v2/)
addressing scheme that they want.


---------------------------------------------------------------------------

##             Further Censorship Countermeasures
................................................................................
e-mail server, told the e-mail server the 
suggested-deletion-date. The header contains a file
named 

    ./silktorrent_salt.txt
    
which probabilistically guarantees that the 
size and bits-tream of the payload can not be
fully deduced from the tar-file name, forcing
censoring parties to download a considerable 
amount of tar-files that they do not need.


---------------------------------------------------------------------------








|







|

|







 







|







54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
..
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
feet, mail-drones, commuters, who just pick up and
dump files through their cellphone WiFi, etc.
**Silktorrent e-mail or an instant messaging
service can be implemented by saving extra
records to a separate database, where there is a
relation between the tar-file name, recipient ID and 
suggested-deletion-date.** 
Counter-measures for Denial-of-Service attacks are 
based on authentication, timing, location(channel).


One of the core ideas of the Silktorrent is that 
the Silktorrent applications must assume that the 
location of the tar-file can not be concluded from
its name. Silktorrent applications ask for tar-files
from agents, who might not have the requested tar-file 
available and the agents might not even be able to 
retrieve the requested tar-file. The agents are free to
use whatever [crazy](http://longterm.softf1.com/specifications/lightmsgp/v2/)
addressing scheme that they want.


---------------------------------------------------------------------------

##             Further Censorship Countermeasures
................................................................................
e-mail server, told the e-mail server the 
suggested-deletion-date. The header contains a file
named 

    ./silktorrent_salt.txt
    
which probabilistically guarantees that the 
size and bit-stream of the payload can not be
fully deduced from the tar-file name, forcing
censoring parties to download a considerable 
amount of tar-files that they do not need.


---------------------------------------------------------------------------